Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1759775 - MaRDI portal

scientific article; zbMATH DE number 1759775

From MaRDI portal
Publication:4536798

zbMath0989.94505MaRDI QIDQ4536798

Bernd Meyer, Ingrid Biehl, Volker Müller

Publication date: 6 August 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Quantum lattice enumeration and tweaking discrete pruningA Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)Partially Known Nonces and Fault Injection Attacks on SM2 Signature AlgorithmWhite-box ECDSA: challenges and existing solutionsLattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSAFault attacks on hyperelliptic curve discrete logarithm problem over binary fieldAll shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacksAnalysis of the fault attack ECDLP over prime fieldFault Attacks on Public Key Elements: Application to DLP-Based SchemesStatistical Fault Attacks on Nonce-Based Authenticated Encryption SchemesFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesDifferential fault attack on Montgomery ladder and in the presence of scalar randomizationMontgomery Residue Representation Fault-Tolerant Computation in GF(2 k )Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signaturesFault analysis of the NTRUSign digital signature schemeFault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptographyTowards practical key exchange from ordinary isogeny graphsImproved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same RoundFault-based attack on Montgomery's ladder algorithmFault attacks on nonce-based authenticated encryption: application to Keyak and KetjeLattice-Based Fault Attacks Against ECMQVUnnamed ItemElliptic curve cryptosystems in the presence of permanent and transient faultsWhite-box cryptography: don't forget about grey-box attacksDifferential fault analysis of AES: toward reducing number of faultsProtecting ECC against fault attacks: the ring extension method revisitedGeneral Fault Attacks on Multivariate Public Key CryptosystemsEfficient Algorithms for Supersingular Isogeny Diffie-HellmanA Brief History of Pairings




This page was built for publication: